Abstract

Cloud computing [1] is the most upcoming area of the IT industry that helps the users to get rid of the hardware resources and complexity in storage and computational power. All the people started using cloud which led to many security concerns relating to the data confidentiality and integrity. This became a challenge to the widespread of the new cloud computing technology. Many measures are taken to improve the cloud security and then there came the concept of cryptography to upgrade the cloud security. Today, the main problem is to sustain data privacy [2] against unreliable cloud service providers and to provide correct query results to the authenticated users. Existing approach provide confidentiality using only one symmetric encryption algorithm which generates only one secret key to both encrypt and decrypt. But this is not so secured as the attacker can easily guess the algorithm and thereby find the key. In this journal, we proposed a randomized encryption technique in which the files are randomly encrypted by three strong algorithms AES, Triple DES and Blowfish [3] which improves the security and we are also implementing new techniques to improve security like key generation via OTP method, etc. In addition to this, we are also going to solve the storage issue of redundant or duplicate files consuming the cloud storage by using a file-level de-duplication technique which can eliminate the duplication of files uploaded into the cloud, thereby saving storage and reduce the need to buy extra storage.

Highlights

  • Improper credential managementWhen the information of all the users of the cloud is not properly stored [13], the attackers can acts as the legitimate users, enter into the system and access, modify or delete files which may cause potential harm to the organization

  • Introduction the Cloud SecurityRedundant storage of files is important storage issues of Cloud Computing which consume a lot of disk space

  • This can be eliminated by the concept of de-duplication that does not In the present scenario, Cloud Computing is one of the latest allow duplicate files to be stored repeatedly in the cloud. emerging areas of the IT Infrastructure with most powerful network and storage facilities which are being used by almost all the users across the world

Read more

Summary

Improper credential management

When the information of all the users of the cloud is not properly stored [13], the attackers can acts as the legitimate users, enter into the system and access, modify or delete files which may cause potential harm to the organization

Account Hijacking
Insider attacks
Proposed System
Overall Implementation
Conclusion and Future Enhancement
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.